فهرست مطالب :
Contents\nAbbreviations\nTable of Cases\nTable of Statutes\nTable of Statutory Instruments\nTable of EU Regulations\nTable of European Directives\nTable of Treaties, Conventions and Agreements\nPart 1 Data Protection: How to Comply with the\rData Protection Regime\n Chapter 1 Data Protection\n What is Data Protection?\n The Importance of Data Protection\n The Data Protection Rules\n Data Protection Rules\n Summary Data Protection Rules\n General Criteria for Data Processing\n Data Protection Overview\n Lawful Processing\n Definitions\n Chapter 2 Sources of Data Protection Law\n Introduction\n UK DPA 2018\n UK Secondary Legislation\n EU Data Protection Law\n Case Law\n ICO Guides\n ICO Determinations\n Legal Textbooks\n Legal Journals\n EDPB\n European Data Protection Supervisor\n Council of Europe\n Other Data Protection Authorities\n Other Official Sources\n Key/Topical Issues\n Data Protection Websites and Blogs\n Other Laws\n Conferences\n Reference\n Chapter 3 Definitions\n Introduction\n DPA Definitions\n GDPR Definitions\n Two Categories of Personal Data\n Conclusion\n Chapter 4 History and Data Protection\n Introduction\n History of Data Protection\n Data Protection Act\n Legal Instruments\n GDPR\n Conclusion\n Chapter 5 Principles\n Introduction\n When Data Protection Provisions Apply\n Fair Processing Requirements\n Principles of Data Protection\n Chapter 6 Ordinary Personal Data Lawful Processing\rConditions\n Introduction\n General Lawful Processing Conditions\n Special Personal Data Lawful Processing Conditions\n Chapter 7 Processing Pre-Conditions: Prior Information Requirements and Transparency\n Introduction\n Prior Information Requirements under the EU General Data Protection Regulation (GDPR)\n Conclusion\n Chapter 8 Exemptions\n Introduction\n Exemptions under the DPA 2018\n Exemptions under the GDPR\n Conclusion\n Chapter 9 Individual Data Subject Rights\n Introduction\n Principles of Data Protection\n Rights for Individual Data Subjects\n Recipients of Right\n Access Right under the DPA 2018\n Access Right\n GDPR: Rectification and Erasure\n Right to Data Portability\n Automated Individual Decision Making Right\n Compensation for Data Subjects\n DPA: Requiring Data Disclosure\n Jurisdiction\n Complaints to ICO\n Organisational Data Protection Group\n Court Remedies\n Different Supervisory Authorities\n Plaintiff Choice of Jurisdictions and Courts\n Compensation\n Penalties\n Sanctions\n GDPR: Right to Portability\n GDPR: Right to Object, Automated Decisions and Profiling\n GDPR Automated Individual Decision Making, Including Profiling\n Conclusion\n Cases to Consider\n Chapter 10 Time Limits for Compliance\n Introduction\n Time Limits\n Conclusion\n Chapter 11 Enforcement and Penalties for Non-Compliance\n Introduction\n Breaches, Offences and Penalties\n Criminal Offences\n Other Consequences of Breach\n ICO Monetary Penalties\n GDPR Changes re Fines and Prosecution\n Civil Sanctions under the DPA\n Remedies, Liability and Penalties under the GDPR\n Powers and Functions of the ICO\n ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions\n Conclusion\n Chapter 12 Security of Personal Data\n Introduction\n Appropriate Security Measures\n Ensuring Appropriate Security Measures\n Security under the EDPB\n Security under the GDPR\n Organisational Security Awareness\n Organisational Security Measures\n Raising Awareness\n ICO Guidance\n ICO and Security Breaches\n Disposal of Computer Hardware\n Conclusion\n Chapter 13 Outsourcing and Data Processors\n Introduction\n Processors and Data Security\n Engaging Processors\n Relying on Third Party Processors\n Conclusion\nPart 2 Inward Facing Organisational DP Obligations\n Chapter 14 Processing Employee Personal Data\n Introduction\n New Inward Facing Changes\n Data Protection Officer (DPO)\n Inward Facing Issues\n Those Covered\n Compliance with the Principles of Data Protection\n Ordinary Personal Data Lawful Processing Conditions\n Lawful Processing and Organisation\'s Employees\n Special Personal Data Lawful Processing Conditions\n Special Data Lawful Processing and Organisation’s Employees\n ICO Codes\n Employees and Security\n Data Access Right of Employees\n Conclusion\n Chapter 15 Employee Data Protection Rights\n Introduction\n The Data Protection Rights of Employees\n Rights Under the GDPR\n Conclusion\n Chapter 16 Employee Considerations\n Introduction\n Contract\n Policies\n Data Protection Policy\n Internet Usage Policy\n Mobile and Device Usage Policies\n Vehicle Use Policy\n Transfers of Undertaking\n Evidence\n Enforceability\n Data Breach\n Employee Data Organisations\n Location\n Conclusion\n Chapter 17 Employee Monitoring Issues\n Introduction\n Sample Legal Issues Arising\n Employee Misuse of Email, Internet, etc\n Contract\n Employment Equality\n Harassment\n Online Abuse\n Offline Abuse\n Child Pornography\n Dealing with the Employee Risks\n Employee Corporate Communications Usage Policies\n Focus of Organisational Communications Usage Policies\n Data Protection and Employee Monitoring\n Human Right\n Application of Data Protection Regime\n ILO Code\n EDPB/WP29\n Employment Contracts, Terms, Policies\n Processing Compliance Rules\n The Rights of Employee Data Subjects\n Monitoring Case\n Conclusion\nPart 3 Outward Facing Organisational DP Obligations\n Chapter 18 Outward Facing Issues\n Introduction\n New Outward Facing Changes\n Data Protection Officer\n Data Protection by Design and by Default\n Types of Outward Facing Personal Data\n How to be Outward Facing Compliant\n Compliance with the Outward Facing Principles\n Customers, etc, and Ordinary Personal Data Lawful Processing Conditions\n Customers, etc, Special Personal Data Lawful Processing Conditions\n Customers, etc, and Security Requirements\n Direct Marketing\n Consequences of Non-Compliance\n Users Versus Customers\n Conclusion\n Chapter 19 Data Protection and Privacy by Design\n Introduction\n Background\n Principles of PbD\n GDPR\n ICO\n EDPB\n Commercial Adoption\n Conclusion\n Chapter 20 Enforcement Powers\n Introduction\n Enforcement Notices\n Assessment Notices\n Powers of Entry and Inspection\n Request for Audit\n Information Notices\n Information Orders\n Failure to Comply\n Unlawful Obtaining Etc of Personal Data\n Re-identifying De-identified Personal Data\n Re-identification and Testing\n Power of ICO to Impose Monetary Penalty\n Prohibition of Requirement to Produce Certain Records\n Tasks\n Powers\n General Conditions for Imposing Administrative Fines\n Penalties\n Conclusion\n Chapter 21 Transfers of Personal Data\n Introduction\n Transfer Ban\n Adequate Protection Exception\n Exceptions\n Creating Adequacy\n Binding Corporate Rules\n GDPR: The New Transfers Regime\n Issues\n Establishing if the Ban Applies\n Checklist for Compliance\n Brexit\n Conclusion\n Chapter 22 ePrivacy and Electronic Communications\n Introduction\n Background\n Scope of the ePD\n Marketing\n Marketing Protection for Organisations\n Conclusion\n Chapter 23 Electronic Direct Marketing and Spam\n Introduction\n Direct Marketing (DM)\n PECR\n ICO Monetary Penalties\n Civil Sanctions\n Call and Fax Opt Out Registers\n The Spam Problem\n Related Issues\n Cases\n Conclusion\nPart 4 New UK Regime\n Chapter 24 Background to the New UK Regime\n Introduction\n Brexit, DPA, and EU\n Queen\'s Speech\n Background Briefing Document\n Digital Charter and Internet Safety\n The Ministerial Statement\n \'Final\' Brexit Negotiations in Transition Period\n Brexit Guides\n Data and the European Union (Withdrawal) Act 2018\n EUWA Details\n EUWA Official Explanatory Commentary\n New ICO Guidance Update\n Preparation\n EDPS Guidance\n Commission\n EDPB\n Brexit and EU (Withdrawal Agreement) Act 2020\n Conclusion\n Chapter 25 The New Data Protection Act\n Introduction\n Repeal\n Breakdown\n Specific Changes from GDPR\n Comment\n Future\nPart 5 New EU Regime\n Chapter 26 New Regime\n Introduction\n Formal Nature of Regulations and Directives\n Review Policy\n Importance\n Fundamental Right\n Innovations\n Enhanced Provisions and Changes\n The New Data Protection Regime\n Main Provisions and Changes of GDPR\n Communicating Data Breach to Data Subject\n Data Protection Officer\n Conclusion\nPart 6 Particular Issues\n Chapter 27 Data Breach\n Introduction\n Data Breach Incidents in Context\n Notification of a Data Breach to Supervisory Authority\n Communication of a Data Breach to Data Subject\n Employee Data Breaches\n Notification Timelines\n Notification Processes\n Data Security Standards\n Incident Response\n Conclusion\n Chapter 28 Data Protection Impact Assessment\n Data Protection Impact Assessment and Prior Consultation\n Data Protection Impact Assessment\n Prior Consultation\n Conclusion\n Chapter 29 Social Media\n Introduction\n Controllers and Joint Controllers\n Investigations\n Social Media and Leveson\n Social Media Data Transfers: Processors\n Apps: Social Media Data Transfers\n Awareness\n Tagging and Identification\n Transparency and User Friendly Tools\n Abuse, Attacks, Threats, Trolling, Victims\n Employment and Social Media\n Electronic Evidence\n The Rights of Data Subjects\n Consent and Social Media\n Website Discretion, Liability and Obligations\n Third Party Controllers and EU Data Subjects\n Specific Processing Risks\n Rights\n GDPR\n Chapter 30 Leveson, the Press and Data Protection\n Introduction\n DPA 1998, s 32\n Leveson Recommendations\n Comparison\n Conclusion\n Chapter 31 Data Protection Officer\n Introduction\n New Role of DPO\n Tasks and Role\n Summary\n Chapter 32 Brexit, Privacy Shield and Schrems\n Introduction\n Issues and Questions\n Privacy Shield\n Standard Contract Clauses\n Conclusion\n Chapter 33 Other Data Protection Issues\n Introduction\n New Regime\n Medical and Health Data\n Genome Data\n Body Scanners\n Investigation, Discovery and Evidence\n Cloud\n New Hardware Devices, New Software\n Internet of Things\n On-Site/Off-Site\n Online Abuse\n Drones\n Increasing Actions\n AI, Big Data and Data Ethics\n Codes and Certification\n Politics\n Conclusion\nAppendices\n Reference Links\n Legislative Links\n Forms and Documents Links\n Complying with Data Protection\n Objections to Marketing\n Audit Checklist\n Procedures\nIndex